Application Security library
☆11Nov 6, 2012Updated 13 years ago
Alternatives and similar repositories for Application_Security
Users that are interested in Application_Security are comparing it to the libraries listed below
Sorting:
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- RC4 Encryption with CryptoAPI and C☆15Apr 6, 2016Updated 9 years ago
- Old exploits and code for my self-referencing PML4 technique (2014)☆32May 8, 2015Updated 10 years ago
- A simple reflective dll example☆19Jan 8, 2017Updated 9 years ago
- black hat Asia 2017 Slides☆22Mar 30, 2017Updated 8 years ago
- MIR-Engine☆23Jul 6, 2017Updated 8 years ago
- Windows过滤驱动-helloworld☆24Aug 27, 2015Updated 10 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- ☆22Jul 7, 2017Updated 8 years ago
- A scoreboard for Security CTF events☆37Dec 11, 2012Updated 13 years ago
- A sample IoT bot origin from Mirai☆20Mar 29, 2017Updated 8 years ago
- My Quick Note of BlackHat 2015 Arsenal☆26Aug 13, 2015Updated 10 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆78Aug 12, 2015Updated 10 years ago
- x86/64 Linux Debugger (written w/ python stdlib,ctypes/ptrace)☆10May 16, 2017Updated 8 years ago
- ☆12Apr 13, 2017Updated 8 years ago
- Occupy WiFi Firmware☆11Sep 14, 2015Updated 10 years ago
- Use IronPython directly in your code without IronPython DLLs and dependencies☆12Jan 19, 2022Updated 4 years ago
- Pascal interpreter for Android.☆23Sep 16, 2010Updated 15 years ago
- Dynamic binary analysis via platform emulation☆12Aug 10, 2018Updated 7 years ago
- A set of compiled application restriction bypasses☆30Mar 15, 2017Updated 8 years ago
- Collection Of Anti-Debugging Tricks☆100Dec 19, 2015Updated 10 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆47Jan 19, 2018Updated 8 years ago
- Windows Malware☆39Apr 17, 2013Updated 12 years ago
- ☆12Sep 2, 2017Updated 8 years ago
- Free Email Providers☆11Aug 15, 2023Updated 2 years ago
- ☆12Feb 4, 2019Updated 7 years ago
- Nintendo 3DS exploit for CTRSDK CTPK.☆11Jan 9, 2017Updated 9 years ago
- ☆10Aug 8, 2015Updated 10 years ago
- Remote Access Trojan for Chrome and Firefox. It's pretty ugly right now.☆14Sep 9, 2012Updated 13 years ago
- ☆12Feb 19, 2017Updated 9 years ago
- ☆52Sep 15, 2016Updated 9 years ago
- more at http://www.zer0mem.sk/?p=271☆12Jun 11, 2013Updated 12 years ago
- A tool for analyzing code coverage and path coverage without using xdebug.☆23Sep 13, 2012Updated 13 years ago
- Tool for automation of GUI-based testing.☆16Jan 7, 2015Updated 11 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- eSentire additions to the nmap network scanner☆14Mar 29, 2016Updated 9 years ago
- Proof of concept open source implementation of an UAC bypass exploit, based in 2 windows failures.☆12Jun 2, 2020Updated 5 years ago
- Self contained phish endpoint generator and web server.☆11Mar 5, 2015Updated 10 years ago
- Source for many challenges from DEF CON 21 CTF Finals☆33Apr 3, 2014Updated 11 years ago